Hackers vs. testers: A comparison of software vulnerability discovery processes D Votipka, R Stevens, E Redmiles, J Hu, M Mazurek 2018 IEEE Symposium on Security and Privacy (SP), 374-391, 2018 | 48 | 2018 |
User interactions and permission use on android K Micinski, D Votipka, R Stevens, N Kofinas, ML Mazurek, JS Foster Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017 | 36 | 2017 |
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level R Stevens, D Votipka, EM Redmiles, C Ahern, P Sweeney, ML Mazurek 27th USENIX Security Symposium (USENIX Security 18), 621-637, 2018 | 16 | 2018 |
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning R Stevens, O Suciu, A Ruef, S Hong, M Hicks, T Dumitraş https://arxiv.org/abs/1701.04739, 2017 | 13 | 2017 |
Compliance cautions: Investigating security issues associated with us digital-security standards R Stevens, J Dykstra, WK Everette, J Chapman, G Bladow, A Farmer, ... Proc. Network and Distributed System Security Symp, 2020 | 4 | 2020 |
Comparing and developing tools to measure the readability of domain-specific texts E Redmiles, L Maszkiewicz, E Hwang, D Kuchhal, E Liu, M Morales, ... Proceedings of the 2019 Conference on Empirical Methods in Natural Language …, 2019 | 3 | 2019 |
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs R Stevens, J Dykstra, WK Everette, M Mazurek IEEE Security & Privacy, 2020 | 2 | 2020 |
A comprehensive quality evaluation of security and privacy advice on the web EM Redmiles, N Warford, A Jayanti, A Koneru, S Kross, M Morales, ... 29th {USENIX} Security Symposium ({USENIX} Security 20), 89-108, 2020 | 2 | 2020 |
Applied Digital Threat Modeling: It Works R Stevens, D Votipka, EM Redmiles, C Ahern, ML Mazurek IEEE Security & Privacy 17 (4), 35-42, 2019 | 2 | 2019 |
Offensive Digital Countermeasures: Exploring the Implications for Governments R Stevens, J Biller The Cyber Defense Review 3 (3), 93-114, 2018 | 2 | 2018 |
First steps toward measuring the readability of security advice EM Redmiles, M Morales, L Maszkiewicz, R Stevens, E Liu, D Kuchhal, ... | 2 | 2018 |
Calcifying Crisis Readiness R Stevens | 2 | 2017 |
How to Hack Compliance: Using Lessons Learned to Repeatably Audit Compliance Programs for Digital Security Concerns R Stevens, J Dykstra, W Knox-Everette, ML Mazurek Learning from Authoritative Security Experiment Results (LASER), 2020 | 1 | 2020 |
Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems R Stevens 2017 International Conference on Cyber Conflict (CyCon U.S.), 112-118, 2017 | 1 | 2017 |
14 Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective CM Ahmed, J Zhou, R Padilha, CM Rodrigues, F Andaló, G Bertocco, ... | | 2020 |
Optimizing Proactive Measures for Security Operations R Stevens | | 2020 |
Digital Words: Moving Forward with Measuring the Readability of Online Texts EM Redmiles, L Maszkiewicz, E Hwang, D Kuchhal, E Liu, M Morales, ... | | 2018 |
Army Vulnerability Response Program: A Critical Need in the Defense of our Nation R Stevens, M Weigand Cyber Defense Review, 2015 | | 2015 |
Physical Security Threat from Hotel Wi-Fi R Stevens, A Blum 2600 Magazine: The Hacker Quarterly, 2012 | | 2012 |
FLIP Forward Looking Intrusion Protection for Mobile Devices via Snort-Inline™ Hardware Implementation S Mosley, M Potasznik, K Davis, R Stevens, M Ballmann, B Ancheta, ... | | 2007 |